About Adam K Levin | Contact | Videos

Cybersecurity

Cybersecurity columns and articles written and featured by Swiped author Adam K Levin


Single? Here’s How You Can Stay Safe This Valentine’s Day

Share

Let’s face it, even without the threat of fraud and scams, Valentine’s Day can be treacherous. Choose the wrong gift or a bouquet of least-favorite flowers, write the wrong note, and whatever was slightly wrong in your love life can go completely haywire. St. Valentine wore an amethyst ring while he cut hearts (from paper) to send to good soldiers and persecuted Christians. Today, amethyst is the birthstone for the month of February, and billions […]

  • Account takeover

    How the Uber Hack Could Get You Robbed This Christmas (Again)Data Security, Swiped, Cybersecurity

    Share

    News that Uber got hacked and 57 million records were compromised may not seem like an overt threat after this year’s constant mega breaches—but it is. A recent study suggests that even something as “harmless” as a breach involving names, phone numbers, and email addresses can lead to account takeover. The study, entitled “Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials,” was backed by Google and conducted in partnership with the University of California, […]

  • Tips for Buying Safe Connected Devices This Cyber MondayCybersecurity, Privacy

    Share

    Keeping up with news alerts about cybersecurity flaws in consumer electronics is a lot like picking up spilled jelly beans one at a time with a plumber’s wrench. Even if you figure out how to do it and have endless patience, a few will skitter out of sight. Assume for the moment that, unlike most people, you think a lot about cybersecurity and you do your homework before buying a connected device. (I know. This […]

  • SHIELD act

    New York AG Proposes Tougher Data Breach LawsData Security, Cybersecurity

    Share

    Even though we haven’t passed the green flags of Thanksgiving, it’s beginning to look a lot like Christmas—at least for cybersecurity advocates. In this edition of “Someone’s Actually Paying attention,” New York State Attorney General Eric Schneiderman has introduced a bill that expands the definition of a breach in his state. The bill is called the Stop Hacks and Improve Electronic Security Act, or the SHIELD Act for short, and it already has the support […]

  • How Social Media Could Kill Your CompanyCybersecurity, Identity Theft

    Share

    Who are you? These days it depends on a number of factors, all of which a criminal can easily spoof. Where you are matters, both in terms of your geographic location and the kinds of personal information you place online. Ten years ago, many consumers would have shuddered at the idea of putting personal and career information where anyone could see it, much less preferences and opinions. Now it’s commonplace. The Internet being what it is – a decentralized network […]

  • Consumers clamor for free credit freezes in wake of Equifax breachcredit, Cybersecurity, Identity Theft

    Share

    Victims of the Equifax data hack, please sit tight. I’d hate to see people paying money for the wrong thing. That’s already happening to people like, John, in Texas, who ended up regretting his purchase of a $19.95 credit monitoring subscription. Also, I think eventually the right thing is going to happen and consumers will be able to freeze their credit reports—for free. There is, finally, momentum in that direction. If you are sure you don’t need […]

  • The Equifax Breach and the Cybersecurity Silver BulletData Security, Cybersecurity, Technology

    Share

    Some time ago, the popular show Mythbusters wanted to find out if the Lone Ranger was right about silver bullets being better than lead ones. Turns out silver bullets are actually slower and less accurate. When it comes to cybersecurity, quick-fix silver bullets are also less effective than tried-and-true approaches. The most effective cybersecurity strategies begin with two certainties: mistakes will be made, and breaches like the one that hit Equifax will keep happening. The 143 million consumers exposed […]

  • Equifax hack

    Your Equifax Download: What You Need to Know about the Equifax Hackcredit, Swiped, Cybersecurity

    Share

    Everyone knows a mosquito bite doesn’t really start itching until the damage has already been done, and the same goes for many kinds of identity-related crimes. With news of the recent Equifax breach continuing to surface, what do you need to know now to limit your exposure? Equifax has estimated the hack impacts 143 million people, mostly in the United States. (That’s almost half the US population!) The thieves stole names, Social Security numbers, birth […]

  • Machine learning

    As Data Multiplies, Technology Helps Tackle More Challenging Security IssuesData Security, Cybersecurity

    Share

    IT systems have never been more powerful or accessible to businesses. However, the scope and scale of cyber crimes continues to outpace tech innovation. For years, the challenge for internal IT and security teams has been to use existing company data to construct an integrated picture of oddities and unexpected actions on their network. Recent advancements in machine learning and behavior or anomaly-based analytics that leverage existing enterprise logs have provided security teams with much more accurate intelligence […]

  • IoT

    As use of IoT devices explodes, detecting vulnerabilities becomes nascent industryCybersecurity

    Share

    The number of machine-to-machine connected devices—the Internet of Things—is growing faster than the world population. Cisco estimates that M2M connections will grow from 4.9 billion in 2015 to 12.8 billion by 2020 (estimated world population in 2020: 7.7 billion). Growth in IoT security expenditures is as robust. Gartner puts endpoint IoT security spending at $1,183 billion in 2015, and estimates $3,010 billion in 2020. “Everybody’s realizing that IoT security is a serious problem,” says Xu Zou, CEO […]

LOAD MORE ARTICLES